Analysis
-
max time kernel
108s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20-10-2022 04:34
Static task
static1
Behavioral task
behavioral1
Sample
e6b72dc530b3bdb0dd7852cae8a6581bdd6dc88cad8b173ee446c4765480bd20.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e6b72dc530b3bdb0dd7852cae8a6581bdd6dc88cad8b173ee446c4765480bd20.exe
Resource
win10v2004-20220812-en
General
-
Target
e6b72dc530b3bdb0dd7852cae8a6581bdd6dc88cad8b173ee446c4765480bd20.exe
-
Size
72KB
-
MD5
79de8fa52ec9c28247d6238074bc56fc
-
SHA1
acce2bdb5072197e2ba508cf4a203d468e79ec95
-
SHA256
e6b72dc530b3bdb0dd7852cae8a6581bdd6dc88cad8b173ee446c4765480bd20
-
SHA512
783c8c1f741acfe438269f6dae08b2c74c51c362c12c4c905ffd40abfbf7edc62afc3cd5f7321023f75e65c0c012fed6d7674d0f9dd96b44fc844a2c8b9024d0
-
SSDEEP
768:ipQNwC3BEddsEqOt/hyJF+x3BEJwRrPWM:ieTce/U/hKYuKPWM
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Disables RegEdit via registry modification 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" e6b72dc530b3bdb0dd7852cae8a6581bdd6dc88cad8b173ee446c4765480bd20.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" e6b72dc530b3bdb0dd7852cae8a6581bdd6dc88cad8b173ee446c4765480bd20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe -
Executes dropped EXE 64 IoCs
pid Process 1884 backup.exe 1752 backup.exe 1348 data.exe 964 backup.exe 1196 backup.exe 1404 backup.exe 1880 backup.exe 1548 backup.exe 1672 data.exe 268 update.exe 1108 backup.exe 808 backup.exe 1420 backup.exe 316 backup.exe 564 backup.exe 1924 backup.exe 1756 backup.exe 1448 backup.exe 1000 backup.exe 964 backup.exe 1764 backup.exe 320 backup.exe 592 backup.exe 1204 backup.exe 840 backup.exe 1708 backup.exe 1584 backup.exe 1064 backup.exe 560 backup.exe 868 backup.exe 1092 System Restore.exe 1212 backup.exe 524 data.exe 1928 backup.exe 1696 backup.exe 776 data.exe 1956 backup.exe 780 backup.exe 1588 backup.exe 1800 backup.exe 1080 backup.exe 1832 backup.exe 1496 backup.exe 1752 backup.exe 1136 backup.exe 848 System Restore.exe 1056 backup.exe 2016 backup.exe 1292 backup.exe 320 backup.exe 1880 backup.exe 1980 backup.exe 1708 backup.exe 1616 backup.exe 1740 data.exe 1732 backup.exe 1672 backup.exe 524 backup.exe 396 backup.exe 868 backup.exe 1696 data.exe 1820 backup.exe 1140 data.exe 1276 backup.exe -
Loads dropped DLL 64 IoCs
pid Process 608 e6b72dc530b3bdb0dd7852cae8a6581bdd6dc88cad8b173ee446c4765480bd20.exe 608 e6b72dc530b3bdb0dd7852cae8a6581bdd6dc88cad8b173ee446c4765480bd20.exe 608 e6b72dc530b3bdb0dd7852cae8a6581bdd6dc88cad8b173ee446c4765480bd20.exe 608 e6b72dc530b3bdb0dd7852cae8a6581bdd6dc88cad8b173ee446c4765480bd20.exe 608 e6b72dc530b3bdb0dd7852cae8a6581bdd6dc88cad8b173ee446c4765480bd20.exe 608 e6b72dc530b3bdb0dd7852cae8a6581bdd6dc88cad8b173ee446c4765480bd20.exe 608 e6b72dc530b3bdb0dd7852cae8a6581bdd6dc88cad8b173ee446c4765480bd20.exe 608 e6b72dc530b3bdb0dd7852cae8a6581bdd6dc88cad8b173ee446c4765480bd20.exe 608 e6b72dc530b3bdb0dd7852cae8a6581bdd6dc88cad8b173ee446c4765480bd20.exe 608 e6b72dc530b3bdb0dd7852cae8a6581bdd6dc88cad8b173ee446c4765480bd20.exe 608 e6b72dc530b3bdb0dd7852cae8a6581bdd6dc88cad8b173ee446c4765480bd20.exe 608 e6b72dc530b3bdb0dd7852cae8a6581bdd6dc88cad8b173ee446c4765480bd20.exe 608 e6b72dc530b3bdb0dd7852cae8a6581bdd6dc88cad8b173ee446c4765480bd20.exe 608 e6b72dc530b3bdb0dd7852cae8a6581bdd6dc88cad8b173ee446c4765480bd20.exe 1548 backup.exe 1548 backup.exe 1672 data.exe 1548 backup.exe 1548 backup.exe 268 update.exe 268 update.exe 268 update.exe 1108 backup.exe 1108 backup.exe 808 backup.exe 808 backup.exe 1108 backup.exe 1108 backup.exe 316 backup.exe 316 backup.exe 1548 backup.exe 1548 backup.exe 564 backup.exe 1924 backup.exe 564 backup.exe 1924 backup.exe 1448 backup.exe 1448 backup.exe 1000 backup.exe 1000 backup.exe 1000 backup.exe 1000 backup.exe 1764 backup.exe 1764 backup.exe 1764 backup.exe 1764 backup.exe 564 backup.exe 564 backup.exe 1204 backup.exe 1204 backup.exe 1204 backup.exe 1204 backup.exe 1764 backup.exe 1764 backup.exe 1204 backup.exe 1764 backup.exe 1764 backup.exe 1204 backup.exe 1064 backup.exe 1064 backup.exe 1204 backup.exe 1204 backup.exe 1204 backup.exe 1204 backup.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\data.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\data.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\data.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\PMP\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe backup.exe File opened for modification C:\Program Files\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\backup.exe data.exe File opened for modification C:\Program Files\DVD Maker\fr-FR\backup.exe data.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Google\Policies\backup.exe data.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\backup.exe data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Help\en_US\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe System Restore.exe File opened for modification C:\Program Files\Google\Chrome\Application\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\data.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\CMap\backup.exe data.exe File opened for modification C:\Program Files\Common Files\System\ado\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\System\ado\de-DE\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Google\Update\backup.exe data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\data.exe backup.exe File opened for modification C:\Program Files\7-Zip\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Services\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\es-ES\backup.exe data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\backup.exe data.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\prc\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe data.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Google\Temp\backup.exe data.exe File opened for modification C:\Program Files\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe backup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 608 e6b72dc530b3bdb0dd7852cae8a6581bdd6dc88cad8b173ee446c4765480bd20.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 608 e6b72dc530b3bdb0dd7852cae8a6581bdd6dc88cad8b173ee446c4765480bd20.exe 1884 backup.exe 1752 backup.exe 1348 data.exe 964 backup.exe 1196 backup.exe 1404 backup.exe 1880 backup.exe 1548 backup.exe 1672 data.exe 1108 backup.exe 268 update.exe 808 backup.exe 1420 backup.exe 316 backup.exe 564 backup.exe 1924 backup.exe 1756 backup.exe 1448 backup.exe 1000 backup.exe 964 backup.exe 1764 backup.exe 320 backup.exe 592 backup.exe 1204 backup.exe 840 backup.exe 1708 backup.exe 1584 backup.exe 1064 backup.exe 560 backup.exe 1092 System Restore.exe 868 backup.exe 1212 backup.exe 524 data.exe 1928 backup.exe 1696 backup.exe 776 data.exe 1956 backup.exe 780 backup.exe 1588 backup.exe 1800 backup.exe 1080 backup.exe 1832 backup.exe 1496 backup.exe 1752 backup.exe 1136 backup.exe 848 System Restore.exe 1056 backup.exe 2016 backup.exe 1292 backup.exe 320 backup.exe 1880 backup.exe 1980 backup.exe 1708 backup.exe 1616 backup.exe 1740 data.exe 1732 backup.exe 1672 backup.exe 1820 backup.exe 1140 data.exe 1276 backup.exe 1008 data.exe 868 backup.exe 396 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 608 wrote to memory of 1884 608 e6b72dc530b3bdb0dd7852cae8a6581bdd6dc88cad8b173ee446c4765480bd20.exe 28 PID 608 wrote to memory of 1884 608 e6b72dc530b3bdb0dd7852cae8a6581bdd6dc88cad8b173ee446c4765480bd20.exe 28 PID 608 wrote to memory of 1884 608 e6b72dc530b3bdb0dd7852cae8a6581bdd6dc88cad8b173ee446c4765480bd20.exe 28 PID 608 wrote to memory of 1884 608 e6b72dc530b3bdb0dd7852cae8a6581bdd6dc88cad8b173ee446c4765480bd20.exe 28 PID 608 wrote to memory of 1752 608 e6b72dc530b3bdb0dd7852cae8a6581bdd6dc88cad8b173ee446c4765480bd20.exe 29 PID 608 wrote to memory of 1752 608 e6b72dc530b3bdb0dd7852cae8a6581bdd6dc88cad8b173ee446c4765480bd20.exe 29 PID 608 wrote to memory of 1752 608 e6b72dc530b3bdb0dd7852cae8a6581bdd6dc88cad8b173ee446c4765480bd20.exe 29 PID 608 wrote to memory of 1752 608 e6b72dc530b3bdb0dd7852cae8a6581bdd6dc88cad8b173ee446c4765480bd20.exe 29 PID 608 wrote to memory of 1348 608 e6b72dc530b3bdb0dd7852cae8a6581bdd6dc88cad8b173ee446c4765480bd20.exe 30 PID 608 wrote to memory of 1348 608 e6b72dc530b3bdb0dd7852cae8a6581bdd6dc88cad8b173ee446c4765480bd20.exe 30 PID 608 wrote to memory of 1348 608 e6b72dc530b3bdb0dd7852cae8a6581bdd6dc88cad8b173ee446c4765480bd20.exe 30 PID 608 wrote to memory of 1348 608 e6b72dc530b3bdb0dd7852cae8a6581bdd6dc88cad8b173ee446c4765480bd20.exe 30 PID 608 wrote to memory of 964 608 e6b72dc530b3bdb0dd7852cae8a6581bdd6dc88cad8b173ee446c4765480bd20.exe 31 PID 608 wrote to memory of 964 608 e6b72dc530b3bdb0dd7852cae8a6581bdd6dc88cad8b173ee446c4765480bd20.exe 31 PID 608 wrote to memory of 964 608 e6b72dc530b3bdb0dd7852cae8a6581bdd6dc88cad8b173ee446c4765480bd20.exe 31 PID 608 wrote to memory of 964 608 e6b72dc530b3bdb0dd7852cae8a6581bdd6dc88cad8b173ee446c4765480bd20.exe 31 PID 608 wrote to memory of 1196 608 e6b72dc530b3bdb0dd7852cae8a6581bdd6dc88cad8b173ee446c4765480bd20.exe 32 PID 608 wrote to memory of 1196 608 e6b72dc530b3bdb0dd7852cae8a6581bdd6dc88cad8b173ee446c4765480bd20.exe 32 PID 608 wrote to memory of 1196 608 e6b72dc530b3bdb0dd7852cae8a6581bdd6dc88cad8b173ee446c4765480bd20.exe 32 PID 608 wrote to memory of 1196 608 e6b72dc530b3bdb0dd7852cae8a6581bdd6dc88cad8b173ee446c4765480bd20.exe 32 PID 608 wrote to memory of 1404 608 e6b72dc530b3bdb0dd7852cae8a6581bdd6dc88cad8b173ee446c4765480bd20.exe 33 PID 608 wrote to memory of 1404 608 e6b72dc530b3bdb0dd7852cae8a6581bdd6dc88cad8b173ee446c4765480bd20.exe 33 PID 608 wrote to memory of 1404 608 e6b72dc530b3bdb0dd7852cae8a6581bdd6dc88cad8b173ee446c4765480bd20.exe 33 PID 608 wrote to memory of 1404 608 e6b72dc530b3bdb0dd7852cae8a6581bdd6dc88cad8b173ee446c4765480bd20.exe 33 PID 608 wrote to memory of 1880 608 e6b72dc530b3bdb0dd7852cae8a6581bdd6dc88cad8b173ee446c4765480bd20.exe 34 PID 608 wrote to memory of 1880 608 e6b72dc530b3bdb0dd7852cae8a6581bdd6dc88cad8b173ee446c4765480bd20.exe 34 PID 608 wrote to memory of 1880 608 e6b72dc530b3bdb0dd7852cae8a6581bdd6dc88cad8b173ee446c4765480bd20.exe 34 PID 608 wrote to memory of 1880 608 e6b72dc530b3bdb0dd7852cae8a6581bdd6dc88cad8b173ee446c4765480bd20.exe 34 PID 1884 wrote to memory of 1548 1884 backup.exe 35 PID 1884 wrote to memory of 1548 1884 backup.exe 35 PID 1884 wrote to memory of 1548 1884 backup.exe 35 PID 1884 wrote to memory of 1548 1884 backup.exe 35 PID 1548 wrote to memory of 1672 1548 backup.exe 36 PID 1548 wrote to memory of 1672 1548 backup.exe 36 PID 1548 wrote to memory of 1672 1548 backup.exe 36 PID 1548 wrote to memory of 1672 1548 backup.exe 36 PID 1672 wrote to memory of 268 1672 data.exe 37 PID 1672 wrote to memory of 268 1672 data.exe 37 PID 1672 wrote to memory of 268 1672 data.exe 37 PID 1672 wrote to memory of 268 1672 data.exe 37 PID 1672 wrote to memory of 268 1672 data.exe 37 PID 1672 wrote to memory of 268 1672 data.exe 37 PID 1672 wrote to memory of 268 1672 data.exe 37 PID 1548 wrote to memory of 1108 1548 backup.exe 38 PID 1548 wrote to memory of 1108 1548 backup.exe 38 PID 1548 wrote to memory of 1108 1548 backup.exe 38 PID 1548 wrote to memory of 1108 1548 backup.exe 38 PID 1108 wrote to memory of 808 1108 backup.exe 39 PID 1108 wrote to memory of 808 1108 backup.exe 39 PID 1108 wrote to memory of 808 1108 backup.exe 39 PID 1108 wrote to memory of 808 1108 backup.exe 39 PID 808 wrote to memory of 1420 808 backup.exe 40 PID 808 wrote to memory of 1420 808 backup.exe 40 PID 808 wrote to memory of 1420 808 backup.exe 40 PID 808 wrote to memory of 1420 808 backup.exe 40 PID 1108 wrote to memory of 316 1108 backup.exe 41 PID 1108 wrote to memory of 316 1108 backup.exe 41 PID 1108 wrote to memory of 316 1108 backup.exe 41 PID 1108 wrote to memory of 316 1108 backup.exe 41 PID 316 wrote to memory of 564 316 backup.exe 42 PID 316 wrote to memory of 564 316 backup.exe 42 PID 316 wrote to memory of 564 316 backup.exe 42 PID 316 wrote to memory of 564 316 backup.exe 42 PID 1548 wrote to memory of 1924 1548 backup.exe 43 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e6b72dc530b3bdb0dd7852cae8a6581bdd6dc88cad8b173ee446c4765480bd20.exe"C:\Users\Admin\AppData\Local\Temp\e6b72dc530b3bdb0dd7852cae8a6581bdd6dc88cad8b173ee446c4765480bd20.exe"1⤵
- Disables RegEdit via registry modification
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:608 -
C:\Users\Admin\AppData\Local\Temp\4276636986\backup.exeC:\Users\Admin\AppData\Local\Temp\4276636986\backup.exe C:\Users\Admin\AppData\Local\Temp\4276636986\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\backup.exe\backup.exe \3⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1548 -
C:\PerfLogs\data.exeC:\PerfLogs\data.exe C:\PerfLogs\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\PerfLogs\Admin\update.exeC:\PerfLogs\Admin\update.exe C:\PerfLogs\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:268
-
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1420
-
-
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:316 -
C:\Program Files\Common Files\Microsoft Shared\backup.exe"C:\Program Files\Common Files\Microsoft Shared\backup.exe" C:\Program Files\Common Files\Microsoft Shared\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:564 -
C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Filters\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1756
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1204 -
C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:840
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1708
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:560
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1092
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1212
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\data.exe"C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\data.exe" C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:524
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1928
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1956
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1588
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1800
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1832
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\8⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1136 -
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\9⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2016
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:320
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\9⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1880
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1708
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\9⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1616
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1732
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\9⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1276
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\9⤵
- System policy modification
PID:1004
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\9⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1576
-
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- System policy modification
PID:524
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:624
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1220
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\8⤵
- Disables RegEdit via registry modification
PID:964
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\8⤵
- Modifies visibility of file extensions in Explorer
PID:1444
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\8⤵
- Disables RegEdit via registry modification
PID:1832
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\8⤵PID:2020
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\8⤵PID:2012
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\8⤵PID:1620
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\data.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\data.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
PID:1696 -
C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
PID:1720
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\8⤵
- Modifies visibility of file extensions in Explorer
PID:1820
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
PID:2000
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\8⤵PID:1432
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\8⤵PID:776
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
PID:1080 -
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:1912
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\7⤵PID:1704
-
-
C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Stationery\7⤵
- Disables RegEdit via registry modification
- System policy modification
PID:1708
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\7⤵PID:1724
-
-
C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Triedit\7⤵PID:1080
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:868
-
-
C:\Program Files\Common Files\SpeechEngines\backup.exe"C:\Program Files\Common Files\SpeechEngines\backup.exe" C:\Program Files\Common Files\SpeechEngines\6⤵PID:804
-
C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe"C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe" C:\Program Files\Common Files\SpeechEngines\Microsoft\7⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
PID:1712
-
-
-
C:\Program Files\Common Files\System\System Restore.exe"C:\Program Files\Common Files\System\System Restore.exe" C:\Program Files\Common Files\System\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
- System policy modification
PID:1132 -
C:\Program Files\Common Files\System\ado\backup.exe"C:\Program Files\Common Files\System\ado\backup.exe" C:\Program Files\Common Files\System\ado\7⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
- System policy modification
PID:920 -
C:\Program Files\Common Files\System\ado\de-DE\backup.exe"C:\Program Files\Common Files\System\ado\de-DE\backup.exe" C:\Program Files\Common Files\System\ado\de-DE\8⤵PID:624
-
-
C:\Program Files\Common Files\System\ado\en-US\backup.exe"C:\Program Files\Common Files\System\ado\en-US\backup.exe" C:\Program Files\Common Files\System\ado\en-US\8⤵PID:1064
-
-
C:\Program Files\Common Files\System\ado\es-ES\backup.exe"C:\Program Files\Common Files\System\ado\es-ES\backup.exe" C:\Program Files\Common Files\System\ado\es-ES\8⤵PID:816
-
-
-
C:\Program Files\Common Files\System\de-DE\backup.exe"C:\Program Files\Common Files\System\de-DE\backup.exe" C:\Program Files\Common Files\System\de-DE\7⤵PID:276
-
-
C:\Program Files\Common Files\System\en-US\backup.exe"C:\Program Files\Common Files\System\en-US\backup.exe" C:\Program Files\Common Files\System\en-US\7⤵PID:1756
-
-
-
-
C:\Program Files\DVD Maker\data.exe"C:\Program Files\DVD Maker\data.exe" C:\Program Files\DVD Maker\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1140 -
C:\Program Files\DVD Maker\de-DE\backup.exe"C:\Program Files\DVD Maker\de-DE\backup.exe" C:\Program Files\DVD Maker\de-DE\6⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:880
-
-
C:\Program Files\DVD Maker\en-US\backup.exe"C:\Program Files\DVD Maker\en-US\backup.exe" C:\Program Files\DVD Maker\en-US\6⤵
- Disables RegEdit via registry modification
PID:1684
-
-
C:\Program Files\DVD Maker\es-ES\backup.exe"C:\Program Files\DVD Maker\es-ES\backup.exe" C:\Program Files\DVD Maker\es-ES\6⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1276
-
-
C:\Program Files\DVD Maker\fr-FR\backup.exe"C:\Program Files\DVD Maker\fr-FR\backup.exe" C:\Program Files\DVD Maker\fr-FR\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:780
-
-
C:\Program Files\DVD Maker\it-IT\backup.exe"C:\Program Files\DVD Maker\it-IT\backup.exe" C:\Program Files\DVD Maker\it-IT\6⤵PID:1228
-
-
C:\Program Files\DVD Maker\ja-JP\backup.exe"C:\Program Files\DVD Maker\ja-JP\backup.exe" C:\Program Files\DVD Maker\ja-JP\6⤵PID:1068
-
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵
- Drops file in Program Files directory
- System policy modification
PID:960 -
C:\Program Files\Google\Chrome\backup.exe"C:\Program Files\Google\Chrome\backup.exe" C:\Program Files\Google\Chrome\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
- System policy modification
PID:560 -
C:\Program Files\Google\Chrome\Application\backup.exe"C:\Program Files\Google\Chrome\Application\backup.exe" C:\Program Files\Google\Chrome\Application\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
- System policy modification
PID:1992 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
PID:584 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:1648
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\9⤵PID:1616
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\9⤵PID:1740
-
-
-
C:\Program Files\Google\Chrome\Application\Dictionaries\backup.exe"C:\Program Files\Google\Chrome\Application\Dictionaries\backup.exe" C:\Program Files\Google\Chrome\Application\Dictionaries\8⤵PID:1876
-
-
-
-
-
C:\Program Files\Internet Explorer\backup.exe"C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\5⤵PID:1704
-
C:\Program Files\Internet Explorer\de-DE\backup.exe"C:\Program Files\Internet Explorer\de-DE\backup.exe" C:\Program Files\Internet Explorer\de-DE\6⤵PID:668
-
-
-
C:\Program Files\Java\backup.exe"C:\Program Files\Java\backup.exe" C:\Program Files\Java\5⤵PID:1120
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1924 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1448 -
C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1000 -
C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Esl\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:964
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1764 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:320
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:592
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1584
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1064 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:868
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1696
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\data.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\data.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:776 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\9⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:780
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1080
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\8⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1496 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\9⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1752 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\PMP\System Restore.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\PMP\System Restore.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\PMP\10⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:848
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1056 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\10⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1292 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\11⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1980
-
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\data.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\data.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\9⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1740 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\10⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1672
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
PID:836 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\10⤵
- System policy modification
PID:1624
-
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1820 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\prc\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\prc\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\prc\9⤵
- Disables RegEdit via registry modification
PID:1520
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\System Restore.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\System Restore.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\8⤵
- Modifies visibility of file extensions in Explorer
PID:1484
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:1056
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\data.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\data.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\7⤵
- Disables RegEdit via registry modification
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1008 -
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\8⤵
- Disables RegEdit via registry modification
PID:1600 -
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\PFM\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\PFM\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\PFM\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:548
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\8⤵PID:1980
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:624
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\7⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
PID:1800 -
C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:436
-
-
-
-
-
C:\Program Files (x86)\Common Files\backup.exe"C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:396 -
C:\Program Files (x86)\Common Files\Adobe\System Restore.exe"C:\Program Files (x86)\Common Files\Adobe\System Restore.exe" C:\Program Files (x86)\Common Files\Adobe\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
PID:592 -
C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Acrobat\7⤵
- Disables RegEdit via registry modification
PID:1504
-
-
C:\Program Files (x86)\Common Files\Adobe\Help\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Help\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Help\7⤵
- Drops file in Program Files directory
PID:1732 -
C:\Program Files (x86)\Common Files\Adobe\Help\en_US\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Help\en_US\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Help\en_US\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
- System policy modification
PID:1472 -
C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\9⤵PID:1888
-
C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\9.0\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\9.0\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\9.0\10⤵PID:1484
-
-
-
-
-
C:\Program Files (x86)\Common Files\Adobe\Updater6\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Updater6\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Updater6\7⤵PID:556
-
-
-
C:\Program Files (x86)\Common Files\Adobe AIR\backup.exe"C:\Program Files (x86)\Common Files\Adobe AIR\backup.exe" C:\Program Files (x86)\Common Files\Adobe AIR\6⤵PID:524
-
-
C:\Program Files (x86)\Common Files\DESIGNER\backup.exe"C:\Program Files (x86)\Common Files\DESIGNER\backup.exe" C:\Program Files (x86)\Common Files\DESIGNER\6⤵PID:1600
-
-
-
C:\Program Files (x86)\Google\data.exe"C:\Program Files (x86)\Google\data.exe" C:\Program Files (x86)\Google\5⤵
- Drops file in Program Files directory
- System policy modification
PID:1364 -
C:\Program Files (x86)\Google\CrashReports\backup.exe"C:\Program Files (x86)\Google\CrashReports\backup.exe" C:\Program Files (x86)\Google\CrashReports\6⤵PID:276
-
-
C:\Program Files (x86)\Google\Policies\backup.exe"C:\Program Files (x86)\Google\Policies\backup.exe" C:\Program Files (x86)\Google\Policies\6⤵
- Modifies visibility of file extensions in Explorer
PID:1520
-
-
C:\Program Files (x86)\Google\Temp\backup.exe"C:\Program Files (x86)\Google\Temp\backup.exe" C:\Program Files (x86)\Google\Temp\6⤵
- Disables RegEdit via registry modification
PID:1076
-
-
C:\Program Files (x86)\Google\Update\backup.exe"C:\Program Files (x86)\Google\Update\backup.exe" C:\Program Files (x86)\Google\Update\6⤵PID:1880
-
C:\Program Files (x86)\Google\Update\1.3.36.71\backup.exe"C:\Program Files (x86)\Google\Update\1.3.36.71\backup.exe" C:\Program Files (x86)\Google\Update\1.3.36.71\7⤵PID:632
-
-
-
-
C:\Program Files (x86)\Internet Explorer\backup.exe"C:\Program Files (x86)\Internet Explorer\backup.exe" C:\Program Files (x86)\Internet Explorer\5⤵PID:1720
-
-
C:\Program Files (x86)\Microsoft Analysis Services\backup.exe"C:\Program Files (x86)\Microsoft Analysis Services\backup.exe" C:\Program Files (x86)\Microsoft Analysis Services\5⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1288
-
-
-
C:\Users\backup.exeC:\Users\backup.exe C:\Users\4⤵
- Disables RegEdit via registry modification
PID:1588 -
C:\Users\Admin\backup.exeC:\Users\Admin\backup.exe C:\Users\Admin\5⤵
- System policy modification
PID:1668 -
C:\Users\Admin\Contacts\backup.exeC:\Users\Admin\Contacts\backup.exe C:\Users\Admin\Contacts\6⤵
- System policy modification
PID:1756
-
-
C:\Users\Admin\Desktop\data.exeC:\Users\Admin\Desktop\data.exe C:\Users\Admin\Desktop\6⤵
- Disables RegEdit via registry modification
- System policy modification
PID:1892
-
-
C:\Users\Admin\Documents\backup.exeC:\Users\Admin\Documents\backup.exe C:\Users\Admin\Documents\6⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:680
-
-
C:\Users\Admin\Downloads\backup.exeC:\Users\Admin\Downloads\backup.exe C:\Users\Admin\Downloads\6⤵PID:1288
-
-
C:\Users\Admin\Favorites\backup.exeC:\Users\Admin\Favorites\backup.exe C:\Users\Admin\Favorites\6⤵PID:2016
-
-
C:\Users\Admin\Links\backup.exeC:\Users\Admin\Links\backup.exe C:\Users\Admin\Links\6⤵PID:1752
-
-
-
C:\Users\Public\backup.exeC:\Users\Public\backup.exe C:\Users\Public\5⤵PID:1892
-
-
-
C:\Windows\backup.exeC:\Windows\backup.exe C:\Windows\4⤵PID:1480
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1752
-
-
C:\Users\Admin\AppData\Local\Temp\Low\data.exeC:\Users\Admin\AppData\Local\Temp\Low\data.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1348
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:964
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1196
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1404
-
-
C:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exeC:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe C:\Users\Admin\AppData\Local\Temp\WPDNSE\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1880
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD55b6d2530ec00897a6416ca9f67548e15
SHA150bb1ddac6c6b599fe9b052010527b739e55c2f6
SHA256850e288bd3b0f12b4061a3151e74f5930dfe88622c95bf8298da5ce57f17b324
SHA512344976dd4999aaf8e72287afb85970d38bd8a9658c2fda91b0dc0b4d0cf4c923685f5a0f0423ae2fba1524734bc00ed8f2298a0ad567fdae0e38bd580ea325a4
-
Filesize
72KB
MD55b6d2530ec00897a6416ca9f67548e15
SHA150bb1ddac6c6b599fe9b052010527b739e55c2f6
SHA256850e288bd3b0f12b4061a3151e74f5930dfe88622c95bf8298da5ce57f17b324
SHA512344976dd4999aaf8e72287afb85970d38bd8a9658c2fda91b0dc0b4d0cf4c923685f5a0f0423ae2fba1524734bc00ed8f2298a0ad567fdae0e38bd580ea325a4
-
Filesize
72KB
MD55a332d807efd7967767f099164288d80
SHA1e4d99a785608908538a2fbc3c19563f1367e47bb
SHA25627445291438526b5d9f9fa59861df88a1a1c6a0614bd22d3c92099c708f06199
SHA512ac553278741e560b28b99279309da83e6ce4aab2d450c9558bbadcc3ce9ea1ccb50721b4acf73f7db540e20b764228abb7d4d72ac7b79c0580fa1d34be492a30
-
Filesize
72KB
MD55a332d807efd7967767f099164288d80
SHA1e4d99a785608908538a2fbc3c19563f1367e47bb
SHA25627445291438526b5d9f9fa59861df88a1a1c6a0614bd22d3c92099c708f06199
SHA512ac553278741e560b28b99279309da83e6ce4aab2d450c9558bbadcc3ce9ea1ccb50721b4acf73f7db540e20b764228abb7d4d72ac7b79c0580fa1d34be492a30
-
Filesize
72KB
MD5dfda2037a869fb9d6e88fca2403f8825
SHA145494f4b2edd26bfe90cb7641ef6d2a79bffe1e2
SHA2569481b2e2af0585f3969b68f41bbbe676d79e9156aeb71dbd00be016f5d16088b
SHA512889119a682d581f35d96225e3bea5efb91db1da9b26bf31a85dd30a103eae88d48b7dc77fc1efcce6a961438e196c09db8a9336c3467afbdde74edd95edc0018
-
Filesize
72KB
MD5dfda2037a869fb9d6e88fca2403f8825
SHA145494f4b2edd26bfe90cb7641ef6d2a79bffe1e2
SHA2569481b2e2af0585f3969b68f41bbbe676d79e9156aeb71dbd00be016f5d16088b
SHA512889119a682d581f35d96225e3bea5efb91db1da9b26bf31a85dd30a103eae88d48b7dc77fc1efcce6a961438e196c09db8a9336c3467afbdde74edd95edc0018
-
Filesize
72KB
MD5b5a75823d7a6aa33e7c229baebce8cef
SHA147e52c03dbb6f13c69d976d24b9049a895e28816
SHA25625931b6e195c2d4a51909217461d3dbe05f82b6c84dc08fd124d2ecafa1e664d
SHA5122869d0af3ce0efc929d19d64416a5be3fe5face1a1f510e9b17e6a4693b88008823ca86c1445840d525afc3443513807c82eb01d3c17b740902f9efe4d573597
-
Filesize
72KB
MD5b5a75823d7a6aa33e7c229baebce8cef
SHA147e52c03dbb6f13c69d976d24b9049a895e28816
SHA25625931b6e195c2d4a51909217461d3dbe05f82b6c84dc08fd124d2ecafa1e664d
SHA5122869d0af3ce0efc929d19d64416a5be3fe5face1a1f510e9b17e6a4693b88008823ca86c1445840d525afc3443513807c82eb01d3c17b740902f9efe4d573597
-
Filesize
72KB
MD57942e5b4a40df8e56fc2f2795eb3f3a2
SHA15914924de809b669dfda44dfc36c3d1782e9f2b2
SHA2562235be9fee23f8ee032437118eab31adc5d49adf57f54e27dd35fb7b60f4e13a
SHA5128c1904b0443406a062efd759cb853bf7ac6427e87aef03527c0a331163c849eadb6ccec5daa150c81a886d27146b625d94d5008504d7135553e84eeaee3a8b3b
-
Filesize
72KB
MD505b0c373dd03d62250feff5fb8cba82a
SHA11b960a96efce27f7d0b4e800eb5f41ab164c18e2
SHA256dd7fee4d340325f7dd8f004818695fe293f6f2acb3d12137ce930c45c1f14b71
SHA512e884ca932ebb5845be4ddea289871ecbd0400b37d7f189e23b92bc23d042eb7a134bab4aa57a82c974380e9a736d67b73d89eaa430cf3d157e47d5378509f23b
-
Filesize
72KB
MD505b0c373dd03d62250feff5fb8cba82a
SHA11b960a96efce27f7d0b4e800eb5f41ab164c18e2
SHA256dd7fee4d340325f7dd8f004818695fe293f6f2acb3d12137ce930c45c1f14b71
SHA512e884ca932ebb5845be4ddea289871ecbd0400b37d7f189e23b92bc23d042eb7a134bab4aa57a82c974380e9a736d67b73d89eaa430cf3d157e47d5378509f23b
-
Filesize
72KB
MD5caa06fadd02ec175f20c14604cf5e33b
SHA15bee0f8460870f73c912017798f490d28bf65872
SHA2563597c2a1b1b631a5cc515621067135897a511ae1d778d6d820134d65b7bfe2d4
SHA512f6f035469b19655ce5c6decc9183ff1fa364743753213429299c3fbab07791f330c9221a00fb144c610745ff392273af5b540b53ca1e45b7dd3d18b1bc454e3d
-
Filesize
72KB
MD5fc0244fb1ae3f3db5606224e5e93eb84
SHA1676b6be0920f0ce831de5204bb7ffd385dd1edbc
SHA2563f9969b3e05bf186e856cb670afccb075c05383dc405d46ccc4f056df4a0534a
SHA512bfdd5f9dc5201b1fb1b5cbd1a1bb7972f663a11becb8c66ff79450c5e600587515773f13b15851199a4d3d51460cd7072e37c8a89a3dfb1ed3b6c35867f36d18
-
Filesize
72KB
MD5fc0244fb1ae3f3db5606224e5e93eb84
SHA1676b6be0920f0ce831de5204bb7ffd385dd1edbc
SHA2563f9969b3e05bf186e856cb670afccb075c05383dc405d46ccc4f056df4a0534a
SHA512bfdd5f9dc5201b1fb1b5cbd1a1bb7972f663a11becb8c66ff79450c5e600587515773f13b15851199a4d3d51460cd7072e37c8a89a3dfb1ed3b6c35867f36d18
-
Filesize
72KB
MD5522bb4ee448da37bc53e641871cc83ca
SHA172ea2e3957f9f8679674ec87af330d08bc5cd91b
SHA256b3d82860242f2e09b52401c52603405ca7b6cdc3695e516d6e2d8d85d44d8e9e
SHA512c49935906ebf2b2783b5daaa6f10fd93cc9b635b50db47b5fa6f2c4eb3fd5c4eaa6041a857d1609252e951b83858a3d1f49452a56c6790ae1e68a347ef6d9b48
-
Filesize
72KB
MD5522bb4ee448da37bc53e641871cc83ca
SHA172ea2e3957f9f8679674ec87af330d08bc5cd91b
SHA256b3d82860242f2e09b52401c52603405ca7b6cdc3695e516d6e2d8d85d44d8e9e
SHA512c49935906ebf2b2783b5daaa6f10fd93cc9b635b50db47b5fa6f2c4eb3fd5c4eaa6041a857d1609252e951b83858a3d1f49452a56c6790ae1e68a347ef6d9b48
-
Filesize
72KB
MD5a1db67424b9ee44c939ef1eb370946e7
SHA105de2fd7ed3ff115071a9920afa70cf2fdb82672
SHA2561c9013095b8164eb4e49c1da2177c0dfaa9604e1a0ae2ad0b5e5de64fc986d0a
SHA5129e44c9d78ec1af20d7b55bffd8abc676bc2b2afd19b6a63bceb98fdb6f82d41d9d50d226394fdfc9bb125cc89926515e69415bf2ff27c24bcefad252be28744c
-
Filesize
72KB
MD5a1db67424b9ee44c939ef1eb370946e7
SHA105de2fd7ed3ff115071a9920afa70cf2fdb82672
SHA2561c9013095b8164eb4e49c1da2177c0dfaa9604e1a0ae2ad0b5e5de64fc986d0a
SHA5129e44c9d78ec1af20d7b55bffd8abc676bc2b2afd19b6a63bceb98fdb6f82d41d9d50d226394fdfc9bb125cc89926515e69415bf2ff27c24bcefad252be28744c
-
Filesize
72KB
MD5bb432c5d0acb070d6b453618ab1e15be
SHA1513c1e10a4610e54becd71b2d528a42ffc504118
SHA2563596685e88bc8c7c6909ced02d032e483abdea1429eaa69f266762e21d9e0d6c
SHA51229f0edd5153d5710bd6dd8a93997f8b3eef88eb39c0d4e95b5b831f45a6ab41a9cabd57e9d0d1baa584b658b3fae9f36e6e26beb2043ed5645aa4127e2b0fa56
-
Filesize
72KB
MD5bb432c5d0acb070d6b453618ab1e15be
SHA1513c1e10a4610e54becd71b2d528a42ffc504118
SHA2563596685e88bc8c7c6909ced02d032e483abdea1429eaa69f266762e21d9e0d6c
SHA51229f0edd5153d5710bd6dd8a93997f8b3eef88eb39c0d4e95b5b831f45a6ab41a9cabd57e9d0d1baa584b658b3fae9f36e6e26beb2043ed5645aa4127e2b0fa56
-
Filesize
72KB
MD5bb432c5d0acb070d6b453618ab1e15be
SHA1513c1e10a4610e54becd71b2d528a42ffc504118
SHA2563596685e88bc8c7c6909ced02d032e483abdea1429eaa69f266762e21d9e0d6c
SHA51229f0edd5153d5710bd6dd8a93997f8b3eef88eb39c0d4e95b5b831f45a6ab41a9cabd57e9d0d1baa584b658b3fae9f36e6e26beb2043ed5645aa4127e2b0fa56
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5bb432c5d0acb070d6b453618ab1e15be
SHA1513c1e10a4610e54becd71b2d528a42ffc504118
SHA2563596685e88bc8c7c6909ced02d032e483abdea1429eaa69f266762e21d9e0d6c
SHA51229f0edd5153d5710bd6dd8a93997f8b3eef88eb39c0d4e95b5b831f45a6ab41a9cabd57e9d0d1baa584b658b3fae9f36e6e26beb2043ed5645aa4127e2b0fa56
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5bb432c5d0acb070d6b453618ab1e15be
SHA1513c1e10a4610e54becd71b2d528a42ffc504118
SHA2563596685e88bc8c7c6909ced02d032e483abdea1429eaa69f266762e21d9e0d6c
SHA51229f0edd5153d5710bd6dd8a93997f8b3eef88eb39c0d4e95b5b831f45a6ab41a9cabd57e9d0d1baa584b658b3fae9f36e6e26beb2043ed5645aa4127e2b0fa56
-
Filesize
72KB
MD554c2bdb4ce30a995a109fee84a081641
SHA113872dccfbb5f1a9c35841b1e4e4eea2d9c1c458
SHA2560faf563342b2f354980bf1fd0c2b6437ff9a8bf8ab0e0b7b6fc7e4b5d00be76a
SHA512eec30a6373765d60f770c78c1cfc2535a41bba31fd5473d8777edb085bc718599cd8abf1f4f331c71819ca97af1bcd57fe5d94ede7ff85d95663bcaccbe5ad22
-
Filesize
72KB
MD5bb432c5d0acb070d6b453618ab1e15be
SHA1513c1e10a4610e54becd71b2d528a42ffc504118
SHA2563596685e88bc8c7c6909ced02d032e483abdea1429eaa69f266762e21d9e0d6c
SHA51229f0edd5153d5710bd6dd8a93997f8b3eef88eb39c0d4e95b5b831f45a6ab41a9cabd57e9d0d1baa584b658b3fae9f36e6e26beb2043ed5645aa4127e2b0fa56
-
Filesize
72KB
MD554c2bdb4ce30a995a109fee84a081641
SHA113872dccfbb5f1a9c35841b1e4e4eea2d9c1c458
SHA2560faf563342b2f354980bf1fd0c2b6437ff9a8bf8ab0e0b7b6fc7e4b5d00be76a
SHA512eec30a6373765d60f770c78c1cfc2535a41bba31fd5473d8777edb085bc718599cd8abf1f4f331c71819ca97af1bcd57fe5d94ede7ff85d95663bcaccbe5ad22
-
Filesize
72KB
MD5c5069d147335c2f6b066962c2ff10f02
SHA1d156e4bbcd92e243066b73a307094fdd49ae5565
SHA256f71601f5e9afcbb6258a9196c93b14afd752f1b21bedd9c32ecd0375385aa95f
SHA512771efa24115edb1286d8c405be6590a9e4acedab40f22a3f393f2e23cbaf9d4d97500eabc49b75589012226201627dfd808faf952857e3a46e4ae4e6b008e0c6
-
Filesize
72KB
MD5c5069d147335c2f6b066962c2ff10f02
SHA1d156e4bbcd92e243066b73a307094fdd49ae5565
SHA256f71601f5e9afcbb6258a9196c93b14afd752f1b21bedd9c32ecd0375385aa95f
SHA512771efa24115edb1286d8c405be6590a9e4acedab40f22a3f393f2e23cbaf9d4d97500eabc49b75589012226201627dfd808faf952857e3a46e4ae4e6b008e0c6
-
Filesize
72KB
MD55b6d2530ec00897a6416ca9f67548e15
SHA150bb1ddac6c6b599fe9b052010527b739e55c2f6
SHA256850e288bd3b0f12b4061a3151e74f5930dfe88622c95bf8298da5ce57f17b324
SHA512344976dd4999aaf8e72287afb85970d38bd8a9658c2fda91b0dc0b4d0cf4c923685f5a0f0423ae2fba1524734bc00ed8f2298a0ad567fdae0e38bd580ea325a4
-
Filesize
72KB
MD55b6d2530ec00897a6416ca9f67548e15
SHA150bb1ddac6c6b599fe9b052010527b739e55c2f6
SHA256850e288bd3b0f12b4061a3151e74f5930dfe88622c95bf8298da5ce57f17b324
SHA512344976dd4999aaf8e72287afb85970d38bd8a9658c2fda91b0dc0b4d0cf4c923685f5a0f0423ae2fba1524734bc00ed8f2298a0ad567fdae0e38bd580ea325a4
-
Filesize
72KB
MD55b6d2530ec00897a6416ca9f67548e15
SHA150bb1ddac6c6b599fe9b052010527b739e55c2f6
SHA256850e288bd3b0f12b4061a3151e74f5930dfe88622c95bf8298da5ce57f17b324
SHA512344976dd4999aaf8e72287afb85970d38bd8a9658c2fda91b0dc0b4d0cf4c923685f5a0f0423ae2fba1524734bc00ed8f2298a0ad567fdae0e38bd580ea325a4
-
Filesize
72KB
MD55b6d2530ec00897a6416ca9f67548e15
SHA150bb1ddac6c6b599fe9b052010527b739e55c2f6
SHA256850e288bd3b0f12b4061a3151e74f5930dfe88622c95bf8298da5ce57f17b324
SHA512344976dd4999aaf8e72287afb85970d38bd8a9658c2fda91b0dc0b4d0cf4c923685f5a0f0423ae2fba1524734bc00ed8f2298a0ad567fdae0e38bd580ea325a4
-
Filesize
72KB
MD55a332d807efd7967767f099164288d80
SHA1e4d99a785608908538a2fbc3c19563f1367e47bb
SHA25627445291438526b5d9f9fa59861df88a1a1c6a0614bd22d3c92099c708f06199
SHA512ac553278741e560b28b99279309da83e6ce4aab2d450c9558bbadcc3ce9ea1ccb50721b4acf73f7db540e20b764228abb7d4d72ac7b79c0580fa1d34be492a30
-
Filesize
72KB
MD55a332d807efd7967767f099164288d80
SHA1e4d99a785608908538a2fbc3c19563f1367e47bb
SHA25627445291438526b5d9f9fa59861df88a1a1c6a0614bd22d3c92099c708f06199
SHA512ac553278741e560b28b99279309da83e6ce4aab2d450c9558bbadcc3ce9ea1ccb50721b4acf73f7db540e20b764228abb7d4d72ac7b79c0580fa1d34be492a30
-
Filesize
72KB
MD5dfda2037a869fb9d6e88fca2403f8825
SHA145494f4b2edd26bfe90cb7641ef6d2a79bffe1e2
SHA2569481b2e2af0585f3969b68f41bbbe676d79e9156aeb71dbd00be016f5d16088b
SHA512889119a682d581f35d96225e3bea5efb91db1da9b26bf31a85dd30a103eae88d48b7dc77fc1efcce6a961438e196c09db8a9336c3467afbdde74edd95edc0018
-
Filesize
72KB
MD5dfda2037a869fb9d6e88fca2403f8825
SHA145494f4b2edd26bfe90cb7641ef6d2a79bffe1e2
SHA2569481b2e2af0585f3969b68f41bbbe676d79e9156aeb71dbd00be016f5d16088b
SHA512889119a682d581f35d96225e3bea5efb91db1da9b26bf31a85dd30a103eae88d48b7dc77fc1efcce6a961438e196c09db8a9336c3467afbdde74edd95edc0018
-
Filesize
72KB
MD5b5a75823d7a6aa33e7c229baebce8cef
SHA147e52c03dbb6f13c69d976d24b9049a895e28816
SHA25625931b6e195c2d4a51909217461d3dbe05f82b6c84dc08fd124d2ecafa1e664d
SHA5122869d0af3ce0efc929d19d64416a5be3fe5face1a1f510e9b17e6a4693b88008823ca86c1445840d525afc3443513807c82eb01d3c17b740902f9efe4d573597
-
Filesize
72KB
MD5b5a75823d7a6aa33e7c229baebce8cef
SHA147e52c03dbb6f13c69d976d24b9049a895e28816
SHA25625931b6e195c2d4a51909217461d3dbe05f82b6c84dc08fd124d2ecafa1e664d
SHA5122869d0af3ce0efc929d19d64416a5be3fe5face1a1f510e9b17e6a4693b88008823ca86c1445840d525afc3443513807c82eb01d3c17b740902f9efe4d573597
-
Filesize
72KB
MD57942e5b4a40df8e56fc2f2795eb3f3a2
SHA15914924de809b669dfda44dfc36c3d1782e9f2b2
SHA2562235be9fee23f8ee032437118eab31adc5d49adf57f54e27dd35fb7b60f4e13a
SHA5128c1904b0443406a062efd759cb853bf7ac6427e87aef03527c0a331163c849eadb6ccec5daa150c81a886d27146b625d94d5008504d7135553e84eeaee3a8b3b
-
Filesize
72KB
MD57942e5b4a40df8e56fc2f2795eb3f3a2
SHA15914924de809b669dfda44dfc36c3d1782e9f2b2
SHA2562235be9fee23f8ee032437118eab31adc5d49adf57f54e27dd35fb7b60f4e13a
SHA5128c1904b0443406a062efd759cb853bf7ac6427e87aef03527c0a331163c849eadb6ccec5daa150c81a886d27146b625d94d5008504d7135553e84eeaee3a8b3b
-
Filesize
72KB
MD505b0c373dd03d62250feff5fb8cba82a
SHA11b960a96efce27f7d0b4e800eb5f41ab164c18e2
SHA256dd7fee4d340325f7dd8f004818695fe293f6f2acb3d12137ce930c45c1f14b71
SHA512e884ca932ebb5845be4ddea289871ecbd0400b37d7f189e23b92bc23d042eb7a134bab4aa57a82c974380e9a736d67b73d89eaa430cf3d157e47d5378509f23b
-
Filesize
72KB
MD505b0c373dd03d62250feff5fb8cba82a
SHA11b960a96efce27f7d0b4e800eb5f41ab164c18e2
SHA256dd7fee4d340325f7dd8f004818695fe293f6f2acb3d12137ce930c45c1f14b71
SHA512e884ca932ebb5845be4ddea289871ecbd0400b37d7f189e23b92bc23d042eb7a134bab4aa57a82c974380e9a736d67b73d89eaa430cf3d157e47d5378509f23b
-
Filesize
72KB
MD5caa06fadd02ec175f20c14604cf5e33b
SHA15bee0f8460870f73c912017798f490d28bf65872
SHA2563597c2a1b1b631a5cc515621067135897a511ae1d778d6d820134d65b7bfe2d4
SHA512f6f035469b19655ce5c6decc9183ff1fa364743753213429299c3fbab07791f330c9221a00fb144c610745ff392273af5b540b53ca1e45b7dd3d18b1bc454e3d
-
Filesize
72KB
MD5caa06fadd02ec175f20c14604cf5e33b
SHA15bee0f8460870f73c912017798f490d28bf65872
SHA2563597c2a1b1b631a5cc515621067135897a511ae1d778d6d820134d65b7bfe2d4
SHA512f6f035469b19655ce5c6decc9183ff1fa364743753213429299c3fbab07791f330c9221a00fb144c610745ff392273af5b540b53ca1e45b7dd3d18b1bc454e3d
-
Filesize
72KB
MD5fc0244fb1ae3f3db5606224e5e93eb84
SHA1676b6be0920f0ce831de5204bb7ffd385dd1edbc
SHA2563f9969b3e05bf186e856cb670afccb075c05383dc405d46ccc4f056df4a0534a
SHA512bfdd5f9dc5201b1fb1b5cbd1a1bb7972f663a11becb8c66ff79450c5e600587515773f13b15851199a4d3d51460cd7072e37c8a89a3dfb1ed3b6c35867f36d18
-
Filesize
72KB
MD5fc0244fb1ae3f3db5606224e5e93eb84
SHA1676b6be0920f0ce831de5204bb7ffd385dd1edbc
SHA2563f9969b3e05bf186e856cb670afccb075c05383dc405d46ccc4f056df4a0534a
SHA512bfdd5f9dc5201b1fb1b5cbd1a1bb7972f663a11becb8c66ff79450c5e600587515773f13b15851199a4d3d51460cd7072e37c8a89a3dfb1ed3b6c35867f36d18
-
Filesize
72KB
MD5522bb4ee448da37bc53e641871cc83ca
SHA172ea2e3957f9f8679674ec87af330d08bc5cd91b
SHA256b3d82860242f2e09b52401c52603405ca7b6cdc3695e516d6e2d8d85d44d8e9e
SHA512c49935906ebf2b2783b5daaa6f10fd93cc9b635b50db47b5fa6f2c4eb3fd5c4eaa6041a857d1609252e951b83858a3d1f49452a56c6790ae1e68a347ef6d9b48
-
Filesize
72KB
MD5522bb4ee448da37bc53e641871cc83ca
SHA172ea2e3957f9f8679674ec87af330d08bc5cd91b
SHA256b3d82860242f2e09b52401c52603405ca7b6cdc3695e516d6e2d8d85d44d8e9e
SHA512c49935906ebf2b2783b5daaa6f10fd93cc9b635b50db47b5fa6f2c4eb3fd5c4eaa6041a857d1609252e951b83858a3d1f49452a56c6790ae1e68a347ef6d9b48
-
Filesize
72KB
MD5a1db67424b9ee44c939ef1eb370946e7
SHA105de2fd7ed3ff115071a9920afa70cf2fdb82672
SHA2561c9013095b8164eb4e49c1da2177c0dfaa9604e1a0ae2ad0b5e5de64fc986d0a
SHA5129e44c9d78ec1af20d7b55bffd8abc676bc2b2afd19b6a63bceb98fdb6f82d41d9d50d226394fdfc9bb125cc89926515e69415bf2ff27c24bcefad252be28744c
-
Filesize
72KB
MD5a1db67424b9ee44c939ef1eb370946e7
SHA105de2fd7ed3ff115071a9920afa70cf2fdb82672
SHA2561c9013095b8164eb4e49c1da2177c0dfaa9604e1a0ae2ad0b5e5de64fc986d0a
SHA5129e44c9d78ec1af20d7b55bffd8abc676bc2b2afd19b6a63bceb98fdb6f82d41d9d50d226394fdfc9bb125cc89926515e69415bf2ff27c24bcefad252be28744c
-
Filesize
72KB
MD5bb432c5d0acb070d6b453618ab1e15be
SHA1513c1e10a4610e54becd71b2d528a42ffc504118
SHA2563596685e88bc8c7c6909ced02d032e483abdea1429eaa69f266762e21d9e0d6c
SHA51229f0edd5153d5710bd6dd8a93997f8b3eef88eb39c0d4e95b5b831f45a6ab41a9cabd57e9d0d1baa584b658b3fae9f36e6e26beb2043ed5645aa4127e2b0fa56
-
Filesize
72KB
MD5bb432c5d0acb070d6b453618ab1e15be
SHA1513c1e10a4610e54becd71b2d528a42ffc504118
SHA2563596685e88bc8c7c6909ced02d032e483abdea1429eaa69f266762e21d9e0d6c
SHA51229f0edd5153d5710bd6dd8a93997f8b3eef88eb39c0d4e95b5b831f45a6ab41a9cabd57e9d0d1baa584b658b3fae9f36e6e26beb2043ed5645aa4127e2b0fa56
-
Filesize
72KB
MD5bb432c5d0acb070d6b453618ab1e15be
SHA1513c1e10a4610e54becd71b2d528a42ffc504118
SHA2563596685e88bc8c7c6909ced02d032e483abdea1429eaa69f266762e21d9e0d6c
SHA51229f0edd5153d5710bd6dd8a93997f8b3eef88eb39c0d4e95b5b831f45a6ab41a9cabd57e9d0d1baa584b658b3fae9f36e6e26beb2043ed5645aa4127e2b0fa56
-
Filesize
72KB
MD5bb432c5d0acb070d6b453618ab1e15be
SHA1513c1e10a4610e54becd71b2d528a42ffc504118
SHA2563596685e88bc8c7c6909ced02d032e483abdea1429eaa69f266762e21d9e0d6c
SHA51229f0edd5153d5710bd6dd8a93997f8b3eef88eb39c0d4e95b5b831f45a6ab41a9cabd57e9d0d1baa584b658b3fae9f36e6e26beb2043ed5645aa4127e2b0fa56
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5bb432c5d0acb070d6b453618ab1e15be
SHA1513c1e10a4610e54becd71b2d528a42ffc504118
SHA2563596685e88bc8c7c6909ced02d032e483abdea1429eaa69f266762e21d9e0d6c
SHA51229f0edd5153d5710bd6dd8a93997f8b3eef88eb39c0d4e95b5b831f45a6ab41a9cabd57e9d0d1baa584b658b3fae9f36e6e26beb2043ed5645aa4127e2b0fa56
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5bb432c5d0acb070d6b453618ab1e15be
SHA1513c1e10a4610e54becd71b2d528a42ffc504118
SHA2563596685e88bc8c7c6909ced02d032e483abdea1429eaa69f266762e21d9e0d6c
SHA51229f0edd5153d5710bd6dd8a93997f8b3eef88eb39c0d4e95b5b831f45a6ab41a9cabd57e9d0d1baa584b658b3fae9f36e6e26beb2043ed5645aa4127e2b0fa56
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5bb432c5d0acb070d6b453618ab1e15be
SHA1513c1e10a4610e54becd71b2d528a42ffc504118
SHA2563596685e88bc8c7c6909ced02d032e483abdea1429eaa69f266762e21d9e0d6c
SHA51229f0edd5153d5710bd6dd8a93997f8b3eef88eb39c0d4e95b5b831f45a6ab41a9cabd57e9d0d1baa584b658b3fae9f36e6e26beb2043ed5645aa4127e2b0fa56
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5bb432c5d0acb070d6b453618ab1e15be
SHA1513c1e10a4610e54becd71b2d528a42ffc504118
SHA2563596685e88bc8c7c6909ced02d032e483abdea1429eaa69f266762e21d9e0d6c
SHA51229f0edd5153d5710bd6dd8a93997f8b3eef88eb39c0d4e95b5b831f45a6ab41a9cabd57e9d0d1baa584b658b3fae9f36e6e26beb2043ed5645aa4127e2b0fa56
-
Filesize
72KB
MD554c2bdb4ce30a995a109fee84a081641
SHA113872dccfbb5f1a9c35841b1e4e4eea2d9c1c458
SHA2560faf563342b2f354980bf1fd0c2b6437ff9a8bf8ab0e0b7b6fc7e4b5d00be76a
SHA512eec30a6373765d60f770c78c1cfc2535a41bba31fd5473d8777edb085bc718599cd8abf1f4f331c71819ca97af1bcd57fe5d94ede7ff85d95663bcaccbe5ad22
-
Filesize
72KB
MD554c2bdb4ce30a995a109fee84a081641
SHA113872dccfbb5f1a9c35841b1e4e4eea2d9c1c458
SHA2560faf563342b2f354980bf1fd0c2b6437ff9a8bf8ab0e0b7b6fc7e4b5d00be76a
SHA512eec30a6373765d60f770c78c1cfc2535a41bba31fd5473d8777edb085bc718599cd8abf1f4f331c71819ca97af1bcd57fe5d94ede7ff85d95663bcaccbe5ad22
-
Filesize
72KB
MD5bb432c5d0acb070d6b453618ab1e15be
SHA1513c1e10a4610e54becd71b2d528a42ffc504118
SHA2563596685e88bc8c7c6909ced02d032e483abdea1429eaa69f266762e21d9e0d6c
SHA51229f0edd5153d5710bd6dd8a93997f8b3eef88eb39c0d4e95b5b831f45a6ab41a9cabd57e9d0d1baa584b658b3fae9f36e6e26beb2043ed5645aa4127e2b0fa56
-
Filesize
72KB
MD5bb432c5d0acb070d6b453618ab1e15be
SHA1513c1e10a4610e54becd71b2d528a42ffc504118
SHA2563596685e88bc8c7c6909ced02d032e483abdea1429eaa69f266762e21d9e0d6c
SHA51229f0edd5153d5710bd6dd8a93997f8b3eef88eb39c0d4e95b5b831f45a6ab41a9cabd57e9d0d1baa584b658b3fae9f36e6e26beb2043ed5645aa4127e2b0fa56
-
Filesize
72KB
MD554c2bdb4ce30a995a109fee84a081641
SHA113872dccfbb5f1a9c35841b1e4e4eea2d9c1c458
SHA2560faf563342b2f354980bf1fd0c2b6437ff9a8bf8ab0e0b7b6fc7e4b5d00be76a
SHA512eec30a6373765d60f770c78c1cfc2535a41bba31fd5473d8777edb085bc718599cd8abf1f4f331c71819ca97af1bcd57fe5d94ede7ff85d95663bcaccbe5ad22
-
Filesize
72KB
MD554c2bdb4ce30a995a109fee84a081641
SHA113872dccfbb5f1a9c35841b1e4e4eea2d9c1c458
SHA2560faf563342b2f354980bf1fd0c2b6437ff9a8bf8ab0e0b7b6fc7e4b5d00be76a
SHA512eec30a6373765d60f770c78c1cfc2535a41bba31fd5473d8777edb085bc718599cd8abf1f4f331c71819ca97af1bcd57fe5d94ede7ff85d95663bcaccbe5ad22